Ethical Hacking: Network Protocol Analyzer Tool Comparison
dc.contributor.advisor | Cruz, Alfredo | |
dc.contributor.author | Vélez Villegas, Melvin | |
dc.date.accessioned | 2020-09-17T11:53:39Z | |
dc.date.available | 2020-09-17T11:53:39Z | |
dc.date.issued | 2015 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico. | en_US |
dc.description.abstract | The computer security industry spoke about the term “ethical hacking” to describe a hacker with authorization to, without any bad intentions, attacks a network or other security system – whether private or public – on behalf of its owners. Ethical hackers are also called white hat hackers, and they are distinguished from the black hat hackers. They use a variety of tools and apply them efficiently to discover any vulnerability in the system. This is when a Network Packet Analyzer come into place and is used to monitor, intercept, and decode data packets as they are transmitted across networks. Packet analyzers can be computer programs either software or hardware. Some common alternative names for packet analyzers include packet sniffers, protocol analyzers, and network analyzers. We describe different Network Packet Analyzer tools, how they work and examine which are more susceptible to be detected when analyzed. Key Terms - MITM Attack, Network Analyzer, Packet Sniffers, Protocol Analyzers. | en_US |
dc.identifier.citation | Vélez Villegas, M. (2015). Ethical hacking: network protocol analyzer tool comparison [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/698 | |
dc.language.iso | en_US | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.haspart | San Juan | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Spring-2015; | |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
dc.rights.license | All rights reserved | en_US |
dc.subject.lcsh | Electric network analyzers | |
dc.subject.lcsh | Computer networks--Security measures | |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | Ethical Hacking: Network Protocol Analyzer Tool Comparison | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Articulo Final_Melvin Velez.pdf
- Size:
- 590.2 KB
- Format:
- Adobe Portable Document Format
- Description:
- Articulo Final_Melvin Velez
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.63 KB
- Format:
- Item-specific license agreed upon to submission
- Description: